COMMON ISSUES AFFECTING SECURITY USABILITY

Size: px
Start display at page:

Download "COMMON ISSUES AFFECTING SECURITY USABILITY"

Transcription

1 Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth, Plymouth, United Kingdom 2 School of Computer and Information Science, Edith Cowan University, Perth, Western Australia cisnr@plymouth.ac.uk Abstract Prior research has suggested that integrating security features with user goals and increasing their visibility would improve the usability of the associated functionalities. This paper investigates how these approaches affect the efficiency of use and the level of user satisfaction. The user interface of Word 2007 was modified according to these principles, with usability tests being conducted with both the original and the modified user interfaces. The results suggest that integrating security features with user goals improves the efficiency of use, but the impacts upon user satisfaction cannot be clearly identified based on the collected data. No indications of any major improvements in the efficiency of use or user satisfaction are found when the visibility of security features is increased. The combination of these two methods seems to improve both the efficiency of use and the resulting user satisfaction. Keywords Usability, Security, Visibility, Feature Integration, User Goals. INTRODUCTION Several usability studies have been conducted in order to evaluate different security tools and security features in other applications. In some cases the articles describing these studies have even suggested improvements to the studied applications and tools. However, solutions that could be applied to a wide range of applications would be more beneficial for user interface (UI) designers and software developers. Therefore this paper concentrates on presenting common usability issues and solutions that could be used in several everyday applications. The impacts these solutions have on efficiency of use and user satisfaction are also considered. COMMON ISSUES AFFECTING SECURITY USABILITY A variety of factors may potentially affect users ability to understand and use security. Key issues motivating the approach in this study are described in the subsections that follow. Security tasks are not integrated with user goals

2 Dourish et al. (2004) and Smetters and Grinter (2002) have criticised the way security features are presented in many applications. They have argued that the features are not integrated well enough with the tasks users need to do. This can lead to situations in which users cannot use applications or tools in a way that would be natural to them or to the tasks they are trying to complete. Smetters and Grinter (2002) highlight an example of such a situation. They found in their study that from time to time users had to manually change relevant security settings before carrying out certain tasks and then restore the previous settings afterwards. Clearly, having to turn off or bypass security features in this way increases the risk of user errors which can potentially compromise security. It can be argued that if security aspects of a task that users wish to do were integrated with other aspects of the task, it would be easier for them to complete the task successfully. In addition, according to Balfanz et al. (2004) users tend to think about security in the context of the tasks they need to do rather than as security terms, such as certificates or encryption keys. Hence it could be beneficial to integrate security with these tasks so that users do not need to take separate steps in order to achieve the security aspects of their tasks. Lack of visibility The visibility of security related functionalities is often not sufficient for users to notice them easily (Furnell, 2005). Therefore users might not utilise some important security features simply because they have not come across them. In addition, Tognazzini (2003) stated that users of any applications should not be expected to search for features and functionalities. This clearly implies that if average users are expected to utilise different security features in everyday applications, these features should be presented in a way that users will encounter them while using other aspects of these applications. Another important consideration, as observed by Dourish et al. (2004), is that security is not the main concern for most users when they are using IT in their everyday lives. Furthermore, as identified by De Witt and Kuljis (2006), users will often try to get their work done quickly even at the cost of security. The results of their research indicated that this common attitude was not dependent on users security awareness. Even users who were aware of the security consequences of this kind of behaviour often had the same approach. These findings provide further support for the idea that security should be given enough emphasis when designing UIs. If these features are hidden in different menus users can easily give up searching for them or might not even look for them in the first place. USABILITY TEST METHODOLOGY Based on the findings presented above it was decided to test the extent to which integrating security features with user goals and increasing the visibility of the features would affect their usability in everyday applications. In order to limit problems arising from general unfamiliarity, it was decided to base the study upon an application that was likely to be broadly familiar to participants. In addition, it was considered desirable to select a context in which security was available but not necessarily a main priority for users (i.e. such that they would not be inclined to

3 make significant effort to employ it if they were hindered by the usability). From these criteria, Microsoft Word 2007 was selected as the basis for evaluation. Given that the presentation of security features within this application have previously been critiqued in earlier work from Furnell (2007), selecting the application for use in this study also provided an opportunity to address some of the concerns. In order to do this the UI regarding these features was modified with a Word 2007 add-in. User interface modifications The visibility of protecting documents against unauthorised access and modifications was increased. This was achieved by adding a Security Options button to the Save As dialog and removing the General Options menu item from the Tools menu. The General Options dialog that previously presented the protection settings was also replaced with a new Document Level Security Options as shown in Figure 1. (a)

4 (b) Figure 1: The Save As dialog in (a) original form with General Options dialog from the Tools button and (b) modified form with Document Level Security Options dialog from a new Security Options button An effort was made to integrate security features and user goals in three cases. Users were given an option to create documents with access and editing restrictions as well as documents with increased privacy level. This was done by adding menu options to the Office Button as shown in Figure 2. Both of the improvements were tested in two cases: controlling metadata, such as author name and revision number, that is saved with an existing document and controlling the metadata that is saved with all new documents by default. In this paper these are referred to as document level privacy settings and application wide privacy settings respectively. Figure 2: The options from the Office Button in its modified (left) and original (right) forms

5 In the case of document level privacy settings users were able to select the metadata they wanted to be saved with a document instead of having to inspect the document and then remove the unwanted details with the Document Inspector. This was made possible through a privacy tab in the Document Level Security Options dialog as illustrated on the left side of Figure 3. This was done in order to integrate the user goals and the security functionality. In addition the Security Options button that was mentioned earlier was used for increasing the visibility of this feature. Figure 3: The privacy tabs of the new Document Level Security Options and Application Wide Security Options dialogs The visibility of application level privacy settings was increased by adding a Word Security Options button into the modified Office Button menu as shown in Figure 2. Clicking this button opened a dialog shown on the right side of Figure 3. The same approach of integrating this functionality with user goals was used as in the case of document level privacy settings. In the original solution there was no straightforward way of controlling all the metadata described above. It was only possible to remove the default author name through the User name field in the Word Options. In order to do anything beyond this users were required to modify the Normal.dotx template, which is by default used as a template for all new documents. The new approach saved users from inspecting this template with the Document Inspector and removing any unwanted metadata this way. Usability tests Ten users participated in the practical tests. Six of the participants rated themselves as advanced IT users and the rest regarded themselves as intermediate users. All participants used computers daily. In addition all but two of them had prior experience with the Word 2007 (with these two still users of Word 2003). The usability tests consisted of seven different security related tasks, as shown in Table 1, that users might encounter in their day-to-day use of any word processor. In each of these tasks users were required to utilise the features described earlier in this chapter. In addition the users were asked to do all tasks with both the original Word 2007 UI and the modified UI. If users had been divided into two groups each testing only one UI, the variation in the skills and performance of individual users could have caused significant difference between the groups (Nielsen, 1993, pp.178-9). In

6 order to avoid bias caused by this, within-subjects testing was used. In addition, the problems caused by skills transferred between the two UIs was controlled by asking half of the participants to test the modified UI first and the other half to test the original one first as suggested by Nielsen (1993, p.179). Task number Task description 1 Create a new document with restricted access. 2 Restrict access to an existing document. 3 Create a new document that does not contain any personal details in the metadata. 4 Remove personal details from the metadata of an existing document. 5 Create a new read only document. 6 Convert an existing document to a read only document. 7 Change the privacy settings so that by default no personal details will be included in the metadata of new documents. Table 1: Tasks used in the usability tests The efficiency of use was estimated by measuring the completion times and success rates for all tasks. In addition subjective user satisfaction was estimated by recording user opinions regarding the ease of use and preference on certain areas of the UIs. The ease of use was measured with the following 5-point scale: very difficult, difficult, neither easy nor difficult, easy, and very easy. To make comparison between the two UIs easier geometric means were calculated for the completion times and the ease of use. In order to do this for the ease of use, the 5-point scale was represented with a linear numeric scale so that very difficult was given the value 1 and very easy the value 5. RESULTS The following subsections consider the findings in relation to the key factors of user efficiency in performing the tasks and their associated satisfaction with the system when attempting to do so. Efficiency The efficiency of the interfaces was judged in terms of the number of users able to complete each task (shown in the left-hand graph of Figure 4) and the average time that each of the tasks took (shown in the right-hand of the Figure). In terms of task success, it can be seen that while four cases were broadly similar regardless of interface, tasks 1, 3 and 7 fared significantly better under the new design. In terms of completion times the only major difference between the two UIs was noted in task 3, with the modified UI enabling the task to be completed significantly more quickly.

7 Figure 4: User efficiency in terms of task success rates (left) and geometric means of task completion times (right) User satisfaction Users were asked to indicate which interface (original or modified) they preferred for several of the key tasks, as well as to rate the ease of use in each of these contexts. These questions enabled an assessment of their basic preference as well as the extent to which they felt the original and modified interfaces affected their experience. As can be seen in the left-hand graph in Figure 5, there was a clear preference towards the modified interface in most cases, with only the document level protection settings giving a somewhat more mixed result. Similarly, the modified interface was generally favoured in terms of the perceived ease of use. However, as the right-hand graph in Figure 5 shows, the document level protection settings again divided opinion more equally. Figure 5: User satisfaction measured via interfaces preferences (left) and ease of use ratings (right) DISCUSSION Having examined the underlying results, this section considers the overall effectiveness of the different forms of UI adjustment that were made, examining them individually and in combination. Integrating security features with user goals Integrating security features and user goals was tested in tasks 1, 3 and 5. The completion times for task 3 suggested that this approach would improve the efficiency of using the functionality in question. In addition, the success rates were higher for the modified UI which supports this finding. However, only one

8 participant managed to complete the task 3 successfully with the original UI while only three participants out of ten failed the task with the modified one. Hence the task completion times might not be comparable. On the other had the poor success rate shows that the original UI was not very efficient in this respect. The success rates for task 1 support the effectiveness of the improvements used in the modified UI regarding this task. Thus it can be argued that integrating security features and user goals increases the efficiency of using them. User satisfaction concerning document level privacy settings was higher for the modified UI as it scored higher in terms of users opinions regarding ease of use and user preference. Tasks 3 and 4 involved document level privacy settings. Task 3 tested the impacts of unifying security features with user goals while task 4 tested the effects of combining this modification with increasing the visibility of the relevant functionality. However, due to the phrasing of the questions presented to the participants, it was not possible to say which one they referred to when rating the ease of using or preference regarding document level privacy settings. Increasing visibility of security features The results did not show any major differences between the two UI in the tasks 2 or 6 which tested the effects of increasing visibility of security features. Similar task completion times and success rates were recorded for both UIs in these tasks. Similarly, no indications were found that this approach would increase the level of user satisfaction. Nevertheless, there were no indications of decreased levels of usability when this method was used. Assessing the effect of the combined modifications Tasks 4 and 7 tested the combination of integrating security features with user goals and increasing their visibility. In task 7 more users completed the task successfully with the modified UI. In fact none of the participants managed to complete this task successfully with the original user interface. Thus the completion times could not be compared. In task 4 no major differences were found between the two UIs in terms of efficiency of use. Tasks 3 and 4 involved controlling document level privacy settings. As mentioned earlier in this chapter, it could not be determined from the collected data which task users referred to when giving their opinion regarding ease of use and preference. Therefore, based on task 4 conclusions could not be made regarding the effectiveness of the combination of these modifications. In case of task 7, however, users rated the modified UI higher in terms of ease of use. In addition most users preferred the modified UI in this case. Hence it can be argued that the combination of integrating security features with user goals and increasing their visibility improves both the efficiency of use and subjective user satisfaction. CONCLUSIONS The results have indicated that at least in some cases integrating security features with user goals would improve the efficiency of using these features. Two out of three test cases showed improvements in efficiency of use when this approach was used. It could not be clearly identified from the collected data if this approach improved subjective user satisfaction. No indications of improvements in efficiency

9 of use or subjective user satisfaction were found when the visibility of security features was increased. On the other hand this approach does not seem to decrease the usability either. The combination of the two improvements mentioned above seemed to increase the efficiency of use and user satisfaction in one of the two test cases. In order to verify the results presented in this paper, further studies should be carried out with larger and more diverse groups of test users. In addition, the reliability of the results could be increased by testing the effects that different improvements have on the same functionalities and by carrying out similar tests with other applications as well. REFERENCES Balfanz, D., Durfee, G., Smetters, D.K. and Grinter, R.E., (2004), In search of usable security: five lessons from the field, IEEE Security & Privacy, Vol. 2, No. 5, pp DeWitt, A.J. and Kuljis, J., (2006), Aligning usability and security: a usability study of Polaris, Proceedings of the second symposium on Usable privacy and security. Pittsburgh, Pennsylvania, USA: ACM, pp Dourish, P. Grinter, E., Delgado de la Flor, J. and Joseph, M., (2004), Security in the wild: user strategies for managing security as an everyday, practical problem Personal Ubiquitous Comput., Vol. 8, No. 6, pp Furnell, S., (2005), Why users cannot use security, Computers & Security, Vol. 24, No. 4, pp Furnell, S.M., (2007), Making security usable: Are things improving?, Computers & Security, Vol. 26, No. 6, pp Nielsen, J., (1993), Usability Engineering, Academic Press, San Diego, ISBN: Smetters, D.K. and Grinter, R.E., (2002), Moving from the design of usable security technologies to the design of useful secure applications NSPW '02: Proceedings of the 2002 workshop on new security paradigms, New York, NY, USA: ACM, pp Tognazzini, B., (2003), First Principles of Interaction Design, (Accessed 14 January 2008).

Recording end-users security events: A step towards increasing usability

Recording end-users security events: A step towards increasing usability Section 1 Network Systems Engineering Recording end-users security events: A step towards increasing usability Abstract D.Chatziapostolou and S.M.Furnell Network Research Group, University of Plymouth,

More information

Can we afford to remain apathetic towards security apathy? Alexander G. Mirnig, Sandra Trösterer, Elke Beck, Manfred Tscheligi

Can we afford to remain apathetic towards security apathy? Alexander G. Mirnig, Sandra Trösterer, Elke Beck, Manfred Tscheligi Can we afford to remain apathetic towards security apathy? Alexander G. Mirnig, Sandra Trösterer, Elke Beck, Manfred Tscheligi 24.09.2013 1 What is security apathy? Security apathy is unwillingness to

More information

SFU CMPT week 11

SFU CMPT week 11 SFU CMPT-363 2004-2 week 11 Manuel Zahariev E-mail: manuelz@cs.sfu.ca Based on course material from Arthur Kirkpatrick, Alissa Antle and Paul Hibbits July 21, 2004 1 Analytic Methods Advantages can be

More information

Nektarios Kostaras, Mixalis Xenos. Hellenic Open University, School of Sciences & Technology, Patras, Greece

Nektarios Kostaras, Mixalis Xenos. Hellenic Open University, School of Sciences & Technology, Patras, Greece Kostaras N., Xenos M., Assessing Educational Web-site Usability using Heuristic Evaluation Rules, 11th Panhellenic Conference on Informatics with international participation, Vol. B, pp. 543-550, 18-20

More information

A Response Strategy Model for Intrusion Response Systems

A Response Strategy Model for Intrusion Response Systems A Response Strategy Model for Intrusion Response Systems Nor Badrul Anuar 1,2, Maria Papadaki 1, Steven Furnell 1,3, and Nathan Clarke 1,3 1 Centre for Security, Communications and Network Research (CSCAN),

More information

How to Conduct a Heuristic Evaluation

How to Conduct a Heuristic Evaluation Page 1 of 9 useit.com Papers and Essays Heuristic Evaluation How to conduct a heuristic evaluation How to Conduct a Heuristic Evaluation by Jakob Nielsen Heuristic evaluation (Nielsen and Molich, 1990;

More information

Visual Appeal vs. Usability: Which One Influences User Perceptions of a Website More?

Visual Appeal vs. Usability: Which One Influences User Perceptions of a Website More? 1 of 9 10/3/2009 9:42 PM October 2009, Vol. 11 Issue 2 Volume 11 Issue 2 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL)

More information

Evaluation and Design Issues of Nordic DC Metadata Creation Tool

Evaluation and Design Issues of Nordic DC Metadata Creation Tool Evaluation and Design Issues of Nordic DC Metadata Creation Tool Preben Hansen SICS Swedish Institute of computer Science Box 1264, SE-164 29 Kista, Sweden preben@sics.se Abstract This paper presents results

More information

Usability Report. Author: Stephen Varnado Version: 1.0 Date: November 24, 2014

Usability Report. Author: Stephen Varnado Version: 1.0 Date: November 24, 2014 Usability Report Author: Stephen Varnado Version: 1.0 Date: November 24, 2014 2 Table of Contents Executive summary... 3 Introduction... 3 Methodology... 3 Usability test results... 4 Effectiveness ratings

More information

User Experience Report: Heuristic Evaluation

User Experience Report: Heuristic Evaluation User Experience Report: Heuristic Evaluation 1 User Experience Report: Heuristic Evaluation Created by Peter Blair for partial fulfillment of the requirements for MichiganX: UX503x Principles of Designing

More information

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms

Standard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in

More information

An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database

An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database An Analysis of Image Retrieval Behavior for Metadata Type and Google Image Database Toru Fukumoto Canon Inc., JAPAN fukumoto.toru@canon.co.jp Abstract: A large number of digital images are stored on the

More information

User Assessment for Negotiating the Quality of Service for Streaming Media Applications

User Assessment for Negotiating the Quality of Service for Streaming Media Applications User Assessment for Negotiating the Quality of Service for Streaming Media Applications Adina Manoli Human Oriented Technology Lab, Department of Psychology, Carleton University, Ottawa, ON, K1S 5B6, Canada

More information

Introducing Evaluation

Introducing Evaluation Chapter 12 Introducing Evaluation 1 The aims Explain the key concepts used in evaluation. Introduce different evaluation methods. Show how different methods are used for different purposes at different

More information

Web Systems Policies Database Guerilla Testing. Project Cover Sheet. Policies Database Usability Evaluation. UM Library Web Systems

Web Systems Policies Database Guerilla Testing. Project Cover Sheet. Policies Database Usability Evaluation. UM Library Web Systems Project Cover Sheet Policies Database Usability Evaluation Project Committee & Members Report Info Objectives Guerilla Testing The Policies Database is a soon to be released system by which a new policy

More information

Harmonization of usability measurements in ISO9126 software engineering standards

Harmonization of usability measurements in ISO9126 software engineering standards Harmonization of usability measurements in ISO9126 software engineering standards Laila Cheikhi, Alain Abran and Witold Suryn École de Technologie Supérieure, 1100 Notre-Dame Ouest, Montréal, Canada laila.cheikhi.1@ens.etsmtl.ca,

More information

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 Researching the attitudes and perceptions of regional and remote Australians towards mobile providers and domestic roaming Vodafone Regional Roaming Research

More information

Using the Common Industry Format to Document the Context of Use

Using the Common Industry Format to Document the Context of Use Human-Computer Interaction. Human-Centred Design Approaches, Methods, Tools, and Environments - 15th International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings,

More information

IO7- E-learning pilot planning and evaluation report

IO7- E-learning pilot planning and evaluation report Project Number: 2014-1-ES01-KA200-004372 Intergeneration Mentoring for Entrepreneurs IO7- E-learning pilot planning and evaluation report The European Commission support for the production of this publication

More information

Disability and the Web: Why Website Accessibility Matters

Disability and the Web: Why Website Accessibility Matters Edith Cowan University Research Online InfoSci@ECU Seminars Conferences, Symposia and Campus Events 2011 Disability and the Web: Why Website Accessibility Matters Vivienne Conway Edith Cowan University

More information

Take responsibility for completing tasks and procedures subject to direction or guidance as needed.

Take responsibility for completing tasks and procedures subject to direction or guidance as needed. Relevant LINKS BACK TO ITQ UNITS [1] Handbook home page [2] Overview This is the ability to select and use a range of word processing software tools and techniques to produce documents that are at times

More information

Security, Usability, Human Computer Interaction, Intrusion Detection Systems, Home Users, Norton 360

Security, Usability, Human Computer Interaction, Intrusion Detection Systems, Home Users, Norton 360 Assessing the Usability of Personal Internet Security Tools T.Ibrahim 1, S.M.Furnell 1,2, M.Papadaki 1 and N.L.Clarke 1,2 1 Centre for Information Security & Network Research, University of Plymouth, Plymouth,

More information

Opinion 02/2012 on facial recognition in online and mobile services

Opinion 02/2012 on facial recognition in online and mobile services ARTICLE 29 DATA PROTECTION WORKING PARTY 00727/12/EN WP 192 Opinion 02/2012 on facial recognition in online and mobile services Adopted on 22 March 2012 This Working Party was set up under Article 29 of

More information

Web-Based Risk Analysis for Home Users

Web-Based Risk Analysis for Home Users Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2012 Web-Based Risk Analysis for Home Users R. T. Magaya Plymouth University

More information

Testing the Date Maintenance of the File Allocation Table File System

Testing the Date Maintenance of the File Allocation Table File System Abstract Testing the Date Maintenance of the File Allocation Table File Tom Waghorn Edith Cowan University e-mail: twaghorn@student.ecu.edu.au The directory entries used in the File Allocation Table filesystems

More information

CAN WE ESCAPE PASSWORDS?

CAN WE ESCAPE PASSWORDS? INFOSECURITY WITH PLYMOUTH UNIVERSITY CAN WE ESCAPE PASSWORDS? Prof. Steven Furnell Centre for Security, Communications & Network Research Plymouth University United Kingdom Introduction Represents an

More information

Usability Evaluation of Cell Phones for Early Adolescent Users

Usability Evaluation of Cell Phones for Early Adolescent Users Yassierli*, Melati Gilang Industrial Management Research Division, Faculty of Industrial Technology, Bandung Institute of Technology Jl. Ganesa 10 Bandung 40134 Indonesia ABSTRACT:. The increasing number

More information

Human-Centered Design Approach for Middleware

Human-Centered Design Approach for Middleware Human-Centered Design Approach for Middleware V Tadashi Kobayashi V Hiroyo Miyamoto V Michiyo Komatsu (Manuscript received November 7, 2008) At the UI Center of the Fujitsu Software Unit, we introduced

More information

Evaluation report of requirements elicitation practices

Evaluation report of requirements elicitation practices Evaluation report of requirements elicitation practices Version: 1.0 Date: 26.6.2002 Sari Kujala Qure Project Software Business and Engineering Institute Helsinki University of Technology TABLE OF CONTENTS

More information

Generating and Using Results

Generating and Using Results Background Generating and Using Results from Usability Evaluations Kasper Hornbæk University of Copenhagen www.kasperhornbaek.dk Associate professor in the Human computer Interaction group at Copenhagen

More information

Usability Evaluation as a Component of the OPEN Development Framework

Usability Evaluation as a Component of the OPEN Development Framework Usability Evaluation as a Component of the OPEN Development Framework John Eklund Access Testing Centre and The University of Sydney 112 Alexander Street, Crows Nest NSW 2065 Australia johne@testingcentre.com

More information

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017

REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 REGULATED DOMESTIC ROAMING RESEARCH REPORT 2017 Researching the attitudes and perceptions of regional and remote Australians towards mobile providers and domestic roaming Vodafone Regional Roaming Research

More information

Usability Testing Report of College of Liberal Arts & Sciences (CLAS) Website

Usability Testing Report of College of Liberal Arts & Sciences (CLAS) Website Usability Testing Report of College of Liberal Arts & Sciences (CLAS) Website Submitted to: Ceily Hamilton, Director of Information Technology Alex Chapin, Executive Director of Academic Technology Compiled

More information

Heuristic Evaluation: OneView CRM current application

Heuristic Evaluation: OneView CRM current application Evaluation: OneView CRM current application Angela Edwards 22nd August 2016 Executive Summary This report contains the results of a heuristic evaluation undertaken on the OneView CRM application for Lloyds

More information

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle

Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton

More information

Comparing the Usability of RoboFlag Interface Alternatives*

Comparing the Usability of RoboFlag Interface Alternatives* Comparing the Usability of RoboFlag Interface Alternatives* Sangeeta Shankar, Yi Jin, Li Su, Julie A. Adams, and Robert Bodenheimer Department of Electrical Engineering and Computer Science Vanderbilt

More information

iscreen Usability INTRODUCTION

iscreen Usability INTRODUCTION INTRODUCTION Context and motivation The College of IST recently installed an interactive kiosk called iscreen, designed to serve as an information resource for student/visitors to the College of IST. The

More information

UNIT Engineering: Applying Information Technology (SCQF level 6)

UNIT Engineering: Applying Information Technology (SCQF level 6) National Unit Specification: general information CODE F5D4 12 SUMMARY This Unit is a mandatory Unit in the National Qualifications Group Awards (NQGA) in Engineering, but it can also be undertaken as a

More information

Introducing Evaluation

Introducing Evaluation Chapter 12 Introducing Evaluation 1 The aims Explain the key concepts used in evaluation. Introduce different evaluation methods. Show how different methods are used for different purposes at different

More information

Revealing Hidden Context Improving Users Mental Models of Personal Firewalls

Revealing Hidden Context Improving Users Mental Models of Personal Firewalls University of British Columbia Revealing Hidden Context Improving Users Mental Models of Personal Firewalls Fahimeh Raja Kirstie Hawkey and Konstantin Beznosov 1 Outline Background Windows Vista firewall

More information

User-Centred Evaluation Criteria for a Mixed Reality Authoring Application

User-Centred Evaluation Criteria for a Mixed Reality Authoring Application User-Centred Evaluation Criteria for a Mixed Reality Authoring Application Marjaana Träskbäck, Toni Koskinen, Marko Nieminen Helsinki University of Technology, Software Business and Engineering Institute

More information

Lo-Fidelity Prototype Report

Lo-Fidelity Prototype Report Lo-Fidelity Prototype Report Introduction A room scheduling system, at the core, is very simple. However, features and expansions that make it more appealing to users greatly increase the possibility for

More information

Usability. HCI - Human Computer Interaction

Usability. HCI - Human Computer Interaction Usability HCI - Human Computer Interaction Computer systems optimization for easy access and communication Definition design Basic principles Testing assessment implementation Quality Utility funcionality

More information

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN

CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN CHAPTER 4 HUMAN FACTOR BASED USER INTERFACE DESIGN 4.1 Introduction Today one of the most important concerns is how to use the system with effectiveness, efficiency and satisfaction. The ease or comfort

More information

Web Usability in the Irish Airline Industry

Web Usability in the Irish Airline Industry Web Usability in the Irish Airline Industry Low-cost carrier Ryanair are expanding rapidly and have been tipped to become Europe s biggest airline, following the order of 100 new aircraft in a deal with

More information

Modelling E-Commerce Systems Quality with Belief Networks

Modelling E-Commerce Systems Quality with Belief Networks VECIMS 2003 - International Symposium on Virtual Environments, Human-Computer Interfaces, and Measurement Systems Lugano, Switzerland, 27-29 July 2003 Modelling E-Commerce Systems Quality with Belief Networks

More information

AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS

AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS AUTOMATED GUI TESTING OF SOFTWARE APPLICATIONS USING UML MODELS Robertas Jasaitis, Dominykas Barisas, Eduardas Bareisa Kaunas University of Technology, Department of Software Engineering Studentu st. 50,

More information

SAS 70 revised. ISAE 3402 will focus on financial reporting control procedures. Compact_ IT Advisory 41. Introduction

SAS 70 revised. ISAE 3402 will focus on financial reporting control procedures. Compact_ IT Advisory 41. Introduction Compact_ IT Advisory 41 SAS 70 revised ISAE 3402 will focus on financial reporting control procedures Jaap van Beek and Marco Francken J.J. van Beek is a partner at KPMG IT Advisory. He has over twenty-years

More information

Two Traditions of Metadata Development

Two Traditions of Metadata Development Two Traditions of Metadata Development Bibliographic control approach developed before computer technology and internet were commonplace. mainly used in libraries and universities. from early on used rules

More information

USER EXPERIENCE ASSESSMENT TO IMPROVE USER INTERFACE QUALITY ON DEVELOPMENT OF ONLINE FOOD ORDERING SYSTEM

USER EXPERIENCE ASSESSMENT TO IMPROVE USER INTERFACE QUALITY ON DEVELOPMENT OF ONLINE FOOD ORDERING SYSTEM USER EXPERIENCE ASSESSMENT TO IMPROVE USER INTERFACE QUALITY ON DEVELOPMENT OF ONLINE FOOD ORDERING SYSTEM 1 HANIF AL FATTA, 2 BAYU MUKTI 1 Information Technology Department, Universitas AMIKOM Yogyakarta,

More information

Heuristic evaluation of usability of public administration portal

Heuristic evaluation of usability of public administration portal Heuristic evaluation of usability of public administration portal Miloslav Hub, Věra Čapková Abstract This paper presents suggested methodologies of heuristics creation and heuristics application for usability

More information

EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS

EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS EVALUATION OF THE USABILITY OF EDUCATIONAL WEB MEDIA: A CASE STUDY OF GROU.PS Turgay Baş, Hakan Tüzün Hacettepe University (TURKEY) turgaybas@hacettepe.edu.tr, htuzun@hacettepe.edu.tr Abstract In this

More information

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation

Perfect Timing. Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Perfect Timing Alejandra Pardo : Manager Andrew Emrazian : Testing Brant Nielsen : Design Eric Budd : Documentation Problem & Solution College students do their best to plan out their daily tasks, but

More information

Heuristic Evaluation. Hall of Fame or Shame? Hall of Fame or Shame? Hall of Fame! Heuristic Evaluation

Heuristic Evaluation. Hall of Fame or Shame? Hall of Fame or Shame? Hall of Fame! Heuristic Evaluation 1 USER INTERFACE DESIGN + PROTOTYPING + EVALUATION Hall of Fame or Shame? Heuristic Evaluation Prof. James A. Landay University of Washington Pocket By Read It Later 11/1/2012 2 Hall of Fame or Shame?

More information

USER INTERFACE DESIGN + PROTOTYPING + EVALUATION. Heuristic Evaluation. Prof. James A. Landay University of Washington CSE 440

USER INTERFACE DESIGN + PROTOTYPING + EVALUATION. Heuristic Evaluation. Prof. James A. Landay University of Washington CSE 440 USER INTERFACE DESIGN + PROTOTYPING + EVALUATION Heuristic Evaluation Prof. James A. Landay University of Washington CSE 440 February 19, 2013 Hall of Fame or Shame? Pocket By Read It Later Jan. 14-18,

More information

Foundation Level Syllabus Usability Tester Sample Exam

Foundation Level Syllabus Usability Tester Sample Exam Foundation Level Syllabus Usability Tester Sample Exam Version 2017 Provided by German Testing Board Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged.

More information

ACCOMMODATING USABILITY DRIVEN CHANGES IN EXISTING SOFTWARE ARCHITECTURE

ACCOMMODATING USABILITY DRIVEN CHANGES IN EXISTING SOFTWARE ARCHITECTURE ACCOMMODATING USABILITY DRIVEN CHANGES IN EXISTING SOFTWARE ARCHITECTURE Tamer Rafla, Rafiou Oketokoun, Artur Wiklik, Michel Desmarais and Pierre-N Robillard Software Engineering Research Lab (RGL), Department

More information

Formulating XML-IR Queries

Formulating XML-IR Queries Alan Woodley Faculty of Information Technology, Queensland University of Technology PO Box 2434. Brisbane Q 4001, Australia ap.woodley@student.qut.edu.au Abstract: XML information retrieval systems differ

More information

VIDEO SEARCHING AND BROWSING USING VIEWFINDER

VIDEO SEARCHING AND BROWSING USING VIEWFINDER VIDEO SEARCHING AND BROWSING USING VIEWFINDER By Dan E. Albertson Dr. Javed Mostafa John Fieber Ph. D. Student Associate Professor Ph. D. Candidate Information Science Information Science Information Science

More information

A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits

A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits A Linear Regression Model for Assessing the Ranking of Web Sites Based on Number of Visits Dowming Yeh, Pei-Chen Sun, and Jia-Wen Lee National Kaoshiung Normal University Kaoshiung, Taiwan 802, Republic

More information

Higher National Unit specification: general information. Graded Unit 2

Higher National Unit specification: general information. Graded Unit 2 Higher National Unit specification: general information This Graded Unit has been validated as part of the HND Computing: Software Development. Centres are required to develop the assessment instrument

More information

TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia)

TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia) TERTIARY INSTITUTIONS SERVICE CENTRE (Incorporated in Western Australia) Royal Street East Perth, Western Australia 6004 Telephone (08) 9318 8000 Facsimile (08) 9225 7050 http://www.tisc.edu.au/ THE AUSTRALIAN

More information

Usability Report for Online Writing Portfolio

Usability Report for Online Writing Portfolio Usability Report for Online Writing Portfolio October 30, 2012 WR 305.01 Written By: Kelsey Carper I pledge on my honor that I have not given or received any unauthorized assistance in the completion of

More information

The electives catalogue January Multimedia Design and Communication

The electives catalogue January Multimedia Design and Communication The electives catalogue January 2018 Multimedia Design and Communication The electives catalogue, revised January 2018 Content Content 1 1. Elective programme elements... 2 1.1. Completion of the exam...

More information

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study

Iteration vs Recursion in Introduction to Programming Classes: An Empirical Study BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 4 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0068 Iteration vs Recursion in Introduction

More information

Detection of Web-Site Usability Problems: Empirical Comparison of Two Testing Methods

Detection of Web-Site Usability Problems: Empirical Comparison of Two Testing Methods Detection of Web-Site Usability Problems: Empirical Comparison of Two Testing Methods Mikael B. Skov and Jan Stage Department of Computer Science Aalborg University Fredrik Bajers Vej 7 9220 Aalborg East,

More information

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos School of Sciences & Technology,Hellenic Open University,3

More information

Cascading versus Indexed Menu Design

Cascading versus Indexed Menu Design February 2003, Vol. 5 Issue 1 Volume 5 Issue 1 Past Issues A-Z List Usability News is a free web newsletter that is produced by the Software Usability Research Laboratory (SURL) at Wichita State University.

More information

Automated Cognitive Walkthrough for the Web (AutoCWW)

Automated Cognitive Walkthrough for the Web (AutoCWW) CHI 2002 Workshop: Automatically Evaluating the Usability of Web Sites Workshop Date: April 21-22, 2002 Automated Cognitive Walkthrough for the Web (AutoCWW) Position Paper by Marilyn Hughes Blackmon Marilyn

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure

Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure Demetris Kyriacou, Hugh C Davis, and Thanassis Tiropanis Learning Societies Lab School of Electronics

More information

Image resizing and image quality

Image resizing and image quality Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2001 Image resizing and image quality Michael Godlewski Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

Using Clusters on the Vivisimo Web Search Engine

Using Clusters on the Vivisimo Web Search Engine Using Clusters on the Vivisimo Web Search Engine Sherry Koshman and Amanda Spink School of Information Sciences University of Pittsburgh 135 N. Bellefield Ave., Pittsburgh, PA 15237 skoshman@sis.pitt.edu,

More information

Usability of interactive systems: Current practices and challenges of its measurement

Usability of interactive systems: Current practices and challenges of its measurement Usability of interactive systems: Current practices and challenges of its measurement Δρ. Παναγιώτης Ζαχαριάς Τμήμα Πληροφορικής Πανεπιστήμιο Κύπρου 23/2/2010 Concepts and Definitions Usability engineering

More information

The 2010 Personal Firewall Robustness Evaluation

The 2010 Personal Firewall Robustness Evaluation Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2010 The 2010 Personal Robustness Evaluation Satnam Singh Bhamra Edith Cowan University

More information

Integrating User Evaluation into Software Development Environments

Integrating User Evaluation into Software Development Environments Integrating User Evaluation into Software Development Environments Yael Dubinsky, Tiziana Catarci, Shah Rukh Humayoun, and Stephen Kimani Dipartimento di Informatica e Sistemistica Università di Roma "La

More information

Cognitive Walkthrough

Cognitive Walkthrough 1 Cognitive Walkthrough C. Wharton, J. Rieman, C. Lewis and P. Polson, The Cognitive Walkthrough Method: A Practitioner s Guide, in J. Nielsen and R. Mack (eds.), Usability Inspection Methods, John Wiley

More information

Introducing Evaluation

Introducing Evaluation Chapter 12 Introducing Evaluation 1 The aims Explain the key concepts used in evaluation. Introduce different evaluation methods. Show how different methods are used for different purposes at different

More information

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents

More information

Heuristic Evaluation of Groupware. How to do Heuristic Evaluation of Groupware. Benefits

Heuristic Evaluation of Groupware. How to do Heuristic Evaluation of Groupware. Benefits Kimberly Tee ketee@ucalgary.ca CPSC 681 Topic Heuristic Evaluation of Groupware Heuristic evaluation [9] is a discount evaluation method for finding usability problems in a singleuser interface design.

More information

Publications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists

Publications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists Publications ACH Audit Requirements Sound Practices Checklists Price: $150 Member Discounted Price: $75 (489) Revised: 02/2019 A new approach to payments advising SM Purpose of this Document WesPay Advisors

More information

Reviewing Aspects of User Orientated Quality Reporting

Reviewing Aspects of User Orientated Quality Reporting Reviewing Aspects of User Orientated Quality Reporting 1. Background S. Tucker Office for National Statistics, Newport, United Kingdom sarah.tucker@ons.gov.uk National Statistics Institutes are required

More information

COLUMN. Worlds apart: the difference between intranets and websites. The purpose of your website is very different to that of your intranet MARCH 2003

COLUMN. Worlds apart: the difference between intranets and websites. The purpose of your website is very different to that of your intranet MARCH 2003 KM COLUMN MARCH 2003 Worlds apart: the difference between intranets and websites Beyond a common use of HTML, intranets and corporate websites (internet sites) are very different animals. The needs they

More information

Towards Systematic Usability Verification

Towards Systematic Usability Verification Towards Systematic Usability Verification Max Möllers RWTH Aachen University 52056 Aachen, Germany max@cs.rwth-aachen.de Jonathan Diehl RWTH Aachen University 52056 Aachen, Germany diehl@cs.rwth-aachen.de

More information

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services A Working Paper of the EastWest Institute Breakthrough Group Increasing the Global Availability and Use of Secure ICT Products and Services August 5, 2015 The EastWest Institute (EWI) is leading a Global

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Folsom Library & RensSearch Usability Test Plan

Folsom Library & RensSearch Usability Test Plan Folsom Library & RensSearch Usability Test Plan Eric Hansen & Billy Halibut 1 Table of Contents Document Overview!... 3 Methodology!... 3 Participants!... 3 Training!... 4 Procedure!... 4 Roles!... 4 Ethics!5

More information

Evaluating the suitability of Web 2.0 technologies for online atlas access interfaces

Evaluating the suitability of Web 2.0 technologies for online atlas access interfaces Evaluating the suitability of Web 2.0 technologies for online atlas access interfaces Ender ÖZERDEM, Georg GARTNER, Felix ORTAG Department of Geoinformation and Cartography, Vienna University of Technology

More information

What s New in Dealmaker Winter 14?

What s New in Dealmaker Winter 14? What s New in Dealmaker Winter 14? Dealmaker Winter 14 contains significant improvements and enhancements to Smart Account Manager to provide a more powerful, easy-to-use account management solution. This

More information

Usability Evaluation of Tools for Nomadic Application Development

Usability Evaluation of Tools for Nomadic Application Development Usability Evaluation of Tools for Nomadic Application Development Cristina Chesta (1), Carmen Santoro (2), Fabio Paternò (2) (1) Motorola Electronics S.p.a. GSG Italy Via Cardinal Massaia 83, 10147 Torino

More information

UPA 2004 Presentation Page 1

UPA 2004 Presentation Page 1 UPA 2004 Presentation Page 1 Thomas S. Tullis and Jacqueline N. Stetson Human Interface Design Department, Fidelity Center for Applied Technology Fidelity Investments 82 Devonshire St., V4A Boston, MA

More information

Transaction log State Library of Queensland

Transaction log State Library of Queensland Scott Hamilton 1, Helen Thurlow 2 1. Queensland University of Technology, Brisbane, Australia 2. State Library of Queensland, Brisbane, Australia As Queensland's major public reference and research library,

More information

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software Applying ISO/IEC 9126-1 Quality Model to Quality Engineering on Critical Motoei AZUMA Department of Industrial and Management Systems Engineering School of Science and Engineering Waseda University azuma@azuma.mgmt.waseda.ac.jp

More information

PNC.com, Weather.com & SouthWest.com. Usability Analysis. Tyler A. Steinke May 8, 2014 IMS 413

PNC.com, Weather.com & SouthWest.com. Usability Analysis. Tyler A. Steinke May 8, 2014 IMS 413 PNC.com, Weather.com & SouthWest.com Usability Analysis Tyler A. Steinke May 8, 2014 IMS 413 2 P a g e S t e i n k e Table of Contents Introduction 3 Executive Summary 3 Methodology 4 Results 4 Recommendations

More information

Securing and Sharing a Presentation

Securing and Sharing a Presentation 10 Securing and Sharing a Presentation LESSON SKILL MATRIX Skill Exam Objective Objective Number Working with Comments Incorporating Reviewer Changes Review comments. Insert comments. Insert slides from

More information

Contents. Signing In... 3 Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface...

Contents. Signing In... 3 Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface... User Guide Contents Logging On... Signing In... Answering Your Personal Security Question... 4 Forgetting Your Password... 4 Exploring the Learning Center Interface... 5 Understanding Icons... 5 Understanding

More information

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017

Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'

More information

Securing and Sharing a Presentation

Securing and Sharing a Presentation lesson 10 Page 1 Securing and Sharing a Presentation Lesson Skill Matrix Skill Exam Objective Objective Number Working with Comments Review comments. Insert comments. Incorporating Reviewer Changes Insert

More information

This report will document the key themes arising from the testing, and make recommendations for the development of the site.

This report will document the key themes arising from the testing, and make recommendations for the development of the site. Cloudworks usability testing February 2011 In this laboratory test four participants were given a series of nine short tasks to complete on the Cloudworks site. They were asked to verbalise their thought

More information

Experimental Evaluation of Effectiveness of E-Government Websites

Experimental Evaluation of Effectiveness of E-Government Websites Experimental Evaluation of Effectiveness of E-Government Websites A. Basit Darem 1, Dr. Suresha 2 1 Research Scholar, DoS in Computer Science, University of Mysore 2 Associate Professor, DoS in Computer

More information